A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Authorization for metacomputing applications
Proceedings. The Seventh International Symposium on High Performance Distributed Computing (Cat. No.98TB100244)
One of the most difficult problems to be solved by metacomputing systems is to ensure strong authentication and authorization. The problem is complicated since the hosts involved in a metacomputing environment often span multiple administrative domains, each with its own security policy. This paper presents a distributed authorization model used by our resource allocation system, the Prospero Resource Manager [8] . The main components of our design are Extended Access Control Lists, EACLs, and
doi:10.1109/hpdc.1998.709965
dblp:conf/hpdc/GheorghiuRN98
fatcat:i4yg4f3blrgqhixqjtxmymyzsq